Countering cross-technology jamming attack
暂无分享,去创建一个
Ting Zhu | Yan Li | Wei Wang | Xin Liu | Yao Yao | Zicheng Chi | Yanchao Zhang | Yao Yao | Wei Wang | Ting Zhu | Yanchao Zhang | Xin Liu | Zicheng Chi | Yan Li
[1] Par sandy M. Thomas. Quel sens ont nos séquences ? Les brevets en surrégime , 1999 .
[2] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[3] Ming Yu,et al. NIS02-4: A Secure Quality of Service Routing Protocol for Wireless Ad Hoc Networks , 2006, IEEE Globecom 2006.
[4] Ting Zhu,et al. A Dynamic Secure QoS Routing Protocol for Wireless Ad Hoc Networks , 2006, 2006 IEEE Sarnoff Symposium.
[5] P. Frehill,et al. Using Zigbee to Integrate Medical Devices , 2007, 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[6] David Wetherall,et al. Taking the sting out of carrier sense: interference cancellation for wireless LANs , 2008, MobiCom '08.
[7] Dina Katabi,et al. Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.
[8] Philip Levis,et al. The β-factor: measuring wireless link burstiness , 2008, SenSys '08.
[9] Ivan Martinovic,et al. Jamming for good: a fresh approach to authentic communication in WSNs , 2009, WiSec '09.
[10] Radha Poovendran,et al. A Game-Theoretic Framework for Jamming Attacks and Mitigation in Commercial Aircraft Wireless Networks , 2009 .
[11] Wei Wang,et al. SAM: enabling practical spatial multiple access in wireless LAN , 2009, MobiCom '09.
[12] Andreas Terzis,et al. RACNet: a high-fidelity data center sensing network , 2009, SenSys '09.
[13] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.
[14] Vlado Handziski,et al. Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks , 2009, EWSN.
[15] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[16] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[17] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.
[18] Manos M. Tentzeris,et al. A novel Zigbee-based low-cost, low-power wireless EKG system , 2010, 2010 IEEE MTT-S International Microwave Symposium.
[19] Andreas Terzis,et al. Surviving wi-fi interference in low power ZigBee networks , 2010, SenSys '10.
[20] Donald F. Towsley,et al. A secure energy routing mechanism for sharing renewable energy in smart microgrid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[21] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[22] Lei Tang,et al. EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks , 2011, MobiHoc '11.
[23] Srdjan Capkun,et al. Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.
[24] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[25] Yue Wu,et al. Cross-layer Detection for Black Hole Attack in Wireless Network ? , 2012 .
[26] Alon Efrat,et al. Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.
[27] Yue Wu,et al. An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks , 2013, Ad Hoc Sens. Wirel. Networks.
[28] Peng Ning,et al. Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time , 2013, 2013 IEEE Symposium on Security and Privacy.
[29] Triet Vo Huu,et al. Counter-jamming using mixed mechanical and software interference cancellation , 2013, WiSec '13.
[30] Jianhua Li,et al. A denial of service attack in advanced metering infrastructure network , 2014, 2014 IEEE International Conference on Communications (ICC).
[31] Donald F. Towsley,et al. Reliability analysis for cryptographic key management , 2014, 2014 IEEE International Conference on Communications (ICC).
[32] Ruhr-University Bochum,et al. Zero-Communication Seed Establishment for Anti-Jamming Techniques , 2014 .
[33] Ming Li,et al. MIMO-based jamming resilient communication in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[34] Ilenia Tinnirello,et al. Learning from errors: Detecting ZigBee interference in WiFi networks , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).
[35] Ting Zhu,et al. A Survey on Spectrum Utilization in Wireless Sensor Networks , 2015, J. Sensors.
[36] Shu Li,et al. Zigbee transmission system for wearable ECG device based on compressed sensing , 2015 .
[37] Ting Zhu,et al. B2W2: N-Way Concurrent Communication for IoT Devices , 2016, SenSys.
[38] Ting Zhu,et al. Shepherd: sharing energy for privacy preserving in hybrid AC-DC microgrids , 2016, e-Energy.
[39] Ting Zhu,et al. Gait-Based Wi-Fi Signatures for Privacy-Preserving , 2016, AsiaCCS.
[40] Peng Ning,et al. Wireless Communications under Broadband Reactive Jamming Attacks , 2016, IEEE Transactions on Dependable and Secure Computing.
[41] Marwan Krunz,et al. Jamming attack on in-band full-duplex communications: Detection and countermeasures , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[42] Saewoong Bahk,et al. Dodge-Jam: Anti-Jamming Technique for Low-Power and Lossy Wireless Networks , 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[43] Bin Liu,et al. Performance analysis for ZigBee under WiFi interference in smart home , 2017, 2017 IEEE International Conference on Communications (ICC).
[44] Ting Zhu,et al. EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[45] Ting Zhu,et al. PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).
[46] Xin Liu,et al. Chiron: Concurrent High Throughput Communication for IoT Devices , 2018, MobiSys.
[47] Chiron , 2018, Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services.
[48] Wei Wang,et al. GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation , 2018, 2018 IEEE International Conference on Communications (ICC).
[49] Ting Zhu,et al. An Unmanned Aerial Vehicle Navigation Mechanism with Preserving Privacy , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[50] Ting Zhu,et al. Parallel inclusive communication for connecting heterogeneous IoT devices at the edge , 2019, SenSys.
[51] Yan Li,et al. Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data Stream , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.